Ethical Hacking Part 1: Tools and Techniques

ID : 85833

IT professionals are constantly challenged to keep up with the increasing security threats we are all facing. There are lots of courses that teach defense in various forms, but few that show you what the hackers are really doing. People who learn ethical hacking are called "security testers" or "penetration testers" (or, more commonly, "pen testers"). Very large enterprises employ outside pen testers to attempt to crack their systems, and there is a growing demand for dedicated pros. But the pen testing skills are also valuable for IT staff in smaller operations because they can get most of the benefits at a much lower cost in-house. This class takes you beyond certificates like Network+ and Security+ and teaches you the current, real tools and techniques that hackers and social engineers are using against you and the people you support. This is the first course of two.Prerequisites: A minimum of two years of advanced technical support, or recent completion of the Network+ and Security+ or similar. Students must be comfortable working in a Linux environment, have a strong knowledge of networking and good diagnostic skills. Experience with coding is strongly recommended, while competent typing and computer usage skills are mandatory.